CVE-2009-0366 (GCVE-0-2009-0366)
Vulnerability from cvelistv5 – Published: 2009-03-12 15:00 – Updated: 2024-08-07 04:31
VLAI?
Summary
The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:31:25.762Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://launchpad.net/bugs/336396"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://gna.org/bugs/index.php?13037"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog"
},
{
"name": "52672",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/52672"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026view=log"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog"
},
{
"name": "34085",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34085"
},
{
"name": "34253",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34253"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026r1=32990\u0026r2=33069"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://launchpad.net/bugs/cve/2009-0366"
},
{
"name": "34236",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34236"
},
{
"name": "DSA-1737",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1737"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://launchpad.net/bugs/335089"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-03-19T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://launchpad.net/bugs/336396"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://gna.org/bugs/index.php?13037"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog"
},
{
"name": "52672",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/52672"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026view=log"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog"
},
{
"name": "34085",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34085"
},
{
"name": "34253",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34253"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026r1=32990\u0026r2=33069"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://launchpad.net/bugs/cve/2009-0366"
},
{
"name": "34236",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34236"
},
{
"name": "DSA-1737",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1737"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://launchpad.net/bugs/335089"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0366",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://launchpad.net/bugs/336396",
"refsource": "CONFIRM",
"url": "http://launchpad.net/bugs/336396"
},
{
"name": "https://gna.org/bugs/index.php?13037",
"refsource": "CONFIRM",
"url": "https://gna.org/bugs/index.php?13037"
},
{
"name": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog",
"refsource": "CONFIRM",
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog"
},
{
"name": "52672",
"refsource": "OSVDB",
"url": "http://osvdb.org/52672"
},
{
"name": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026view=log",
"refsource": "CONFIRM",
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026view=log"
},
{
"name": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog",
"refsource": "CONFIRM",
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog"
},
{
"name": "34085",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34085"
},
{
"name": "34253",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34253"
},
{
"name": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026r1=32990\u0026r2=33069",
"refsource": "CONFIRM",
"url": "http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026r1=32990\u0026r2=33069"
},
{
"name": "http://launchpad.net/bugs/cve/2009-0366",
"refsource": "CONFIRM",
"url": "http://launchpad.net/bugs/cve/2009-0366"
},
{
"name": "34236",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34236"
},
{
"name": "DSA-1737",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1737"
},
{
"name": "http://launchpad.net/bugs/335089",
"refsource": "CONFIRM",
"url": "http://launchpad.net/bugs/335089"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0366",
"datePublished": "2009-03-12T15:00:00",
"dateReserved": "2009-01-29T00:00:00",
"dateUpdated": "2024-08-07T04:31:25.762Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-0366\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-03-12T15:20:49.717\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n uncompress_buffer en src/server/simple_wml.cpp en Wesnoth anterior a r33069 permite a atacantes remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de un documento WML de gran tama\u00f1o comprimido.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.11\",\"matchCriteriaId\":\"7FBEEB73-9922-4A87-9EE6-A712D58B831A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.0:rc:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0BD9EF4-531F-42FC-B6FB-2EFE9D1DBF27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB817AC-44E4-41CD-BD03-7B5907243FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBDC2E2D-581C-4B8C-8DB1-2B34A22C1788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB9B969-9AEA-47B8-A2C1-D951DA5A6D90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3ECAC12-E14D-47F6-853C-758584EB4E29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2E47D5-D0F1-4FC4-BC1C-9964BE85741D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAFC79CA-F9B0-45FD-904C-B11760E11CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54937870-186F-4342-8658-6F3DA155A53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9488E868-BFC2-4084-802C-874E41E0AE10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A15CBB13-9B93-4C87-A19E-56FFE900D257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63E587C8-E7D8-4FD8-A826-D7BFAE7F270D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED754F0-F2DB-445C-BE11-8525521C7B17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B0FF72F-A313-4BF1-8E7A-BF7EAA2C5EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B219D98C-B08A-4BB6-8C5B-E8978823A4C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18D98006-438D-4DF9-A40A-2B94CE8760EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07FD8E16-22EC-43BF-8ED3-09236F1C3BB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4D957E-7C2A-4062-A3DF-BD02E9CA5D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02358E6-E408-4A1C-A391-9F870625C5C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"383AD5F9-7691-4DA8-9DD6-AAB110F54B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51AF2340-3914-4411-BDC0-6B84548384B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95688481-AC1B-4A58-90D3-E6E76D9E0011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3FF4FDE-AF17-4BCE-AFEC-CDA138B76231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C116EF-BD41-4820-8243-A680EEB70055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55CF49F-7678-41A9-8A4B-012A5B9EC78D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952B7487-A920-40B0-BE80-8FA710149E1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2794D70A-2180-424E-BFC7-848413BBA6B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31232ECA-2AF2-46EF-A9CA-BC692BFE4BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17A4E7EF-F4AD-4A96-BD79-664AFDF5AC4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B57DCD88-7731-49A5-AFCB-5C6104025CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41728562-611D-4F58-AB89-D1887B3564B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D1E17F-BC30-4F01-94D5-A64E07B9B03A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3AF888-E2B1-4130-992C-4B7CF6CF4405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF25A9ED-8349-4DB0-B719-770E3AE30077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4989C0D-A6E6-4317-9640-15E50C62A54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D8C3FF-41EC-4C98-BC7A-5C419559CBA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF780D9D-2D07-42BF-A4AB-97F60C73A7B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A820E98A-D26D-4C9A-B476-8406C88437B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB71E24E-1A08-491F-8379-FE41AF012E90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B57803-62E1-4F50-92DD-6796C6D60758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D83E56-BE05-4DF7-88AD-BC0AD5098415\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"621115C3-5AF6-4709-BB0B-A0FE481C5C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE1549F8-FE6A-49E5-BC19-585C4957E061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD5F86E-F65D-4114-9057-A81B360BE143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"256B2C75-47E5-4A8F-9672-B56D17086764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECD02FB1-72CD-42A3-8E7C-910490467A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15627E66-D852-4F68-9C9A-3EAF5B805BC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"415FE737-8F89-463D-9F1D-EF5EDACFCD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1941BB00-8039-4DD8-815A-1AE0CA986C70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D091DF5-3229-43E0-BEC4-754992B8DD5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77F8C56F-1F74-4F40-85D8-DA861DE4DB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1E58D08-F602-4BE6-978D-34B58E9188B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51001322-B437-4A1C-83BA-C8E3C3BCE7CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A991E343-0C44-4F37-80EE-5C0E45EDA909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4223A3-6F43-4774-8579-59868FB5074B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA5792D1-F342-41F2-B056-D8BA99F5C80E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wesnoth:wesnoth:1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EDB1AAF-2513-4511-9E28-E0E9ACF74C19\"}]}]}],\"references\":[{\"url\":\"http://launchpad.net/bugs/335089\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://launchpad.net/bugs/336396\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://launchpad.net/bugs/cve/2009-0366\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/52672\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34236\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34253\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026r1=32990\u0026r2=33069\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026view=log\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1737\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/34085\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gna.org/bugs/index.php?13037\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://launchpad.net/bugs/335089\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://launchpad.net/bugs/336396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://launchpad.net/bugs/cve/2009-0366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/52672\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026r1=32990\u0026r2=33069\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069\u0026view=log\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1737\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/34085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gna.org/bugs/index.php?13037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…